{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T03:16:15Z","timestamp":1776482175424,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Science Foundation of Shanghai","award":["19ZR1404800"],"award-info":[{"award-number":["19ZR1404800"]}]},{"name":"National Program on Key Basic Research","award":["NO. 2015CB358800"],"award-info":[{"award-number":["NO. 2015CB358800"]}]},{"name":"National Science Foundation","award":["CNS-18-54000"],"award-info":[{"award-number":["CNS-18-54000"]}]},{"name":"National Natural Science Foundation of China","award":["U1636204, U1836210, U1836213, U1736208, 61972099"],"award-info":[{"award-number":["U1636204, U1836210, U1836213, U1736208, 61972099"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,30]]},"DOI":"10.1145\/3372297.3417291","type":"proceedings-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T18:27:02Z","timestamp":1604341622000},"page":"757-770","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":149,"title":["Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware"],"prefix":"10.1145","author":[{"given":"Xiaohan","family":"Zhang","sequence":"first","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"given":"Yuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"given":"Ming","family":"Zhong","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"given":"Daizong","family":"Ding","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"given":"Yinzhi","family":"Cao","sequence":"additional","affiliation":[{"name":"Johns Hopkins University, Baltimore, MD, USA"}]},{"given":"Yukun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"given":"Mi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"given":"Min","family":"Yang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"e_1_3_2_2_2_1","unstructured":"Apktool. 2019. A Tool for Reverse Engineering Android APK Files . https:\/\/ibotpeaches.github.io\/Apktool\/.  Apktool. 2019. A Tool for Reverse Engineering Android APK Files . https:\/\/ibotpeaches.github.io\/Apktool\/."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_2_5_1","volume-title":"Proceedings of the 25th USENIX Security Symposium (USENIX Security). 1101--1118","author":"Backes Michael","year":"2016","unstructured":"Michael Backes , Sven Bugiel , Erik Derr , Patrick McDaniel , Damien Octeau , and Sebastian Weisgerber . 2016 . On Demystifying the Android Application Framework: Re-visiting Android Permission Specification Analysis . In Proceedings of the 25th USENIX Security Symposium (USENIX Security). 1101--1118 . Michael Backes, Sven Bugiel, Erik Derr, Patrick McDaniel, Damien Octeau, and Sebastian Weisgerber. 2016. On Demystifying the Android Application Framework: Re-visiting Android Permission Specification Analysis. In Proceedings of the 25th USENIX Security Symposium (USENIX Security). 1101--1118."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.69"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376746"},{"key":"e_1_3_2_2_8_1","volume-title":"Proceedings of the 26th Advances in Neural Information Processing Systems (NIPS) . 2787--2795","author":"Bordes Antoine","year":"2013","unstructured":"Antoine Bordes , Nicolas Usunier , Alberto Garcia-Duran , Jason Weston , and Oksana Yakhnenko . 2013 . Translating Embeddings for Modeling Multi-relational Data . In Proceedings of the 26th Advances in Neural Information Processing Systems (NIPS) . 2787--2795 . Antoine Bordes, Nicolas Usunier, Alberto Garcia-Duran, Jason Weston, and Oksana Yakhnenko. 2013. Translating Embeddings for Modeling Multi-relational Data. In Proceedings of the 26th Advances in Neural Information Processing Systems (NIPS) . 2787--2795."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371924"},{"key":"e_1_3_2_2_10_1","volume-title":"Proceedings of 24th USENIX Security Symposium (USENIX Security). 659--674","author":"Chen Kai","year":"2015","unstructured":"Kai Chen , Peng Wang , Yeonjoon Lee , XiaoFeng Wang , Nan Zhang , Heqing Huang , Wei Zou , and Peng Liu . 2015 . Finding Unknown Malice in 10 seconds: Mass Vetting for New Threats at the Google-play Scale . In Proceedings of 24th USENIX Security Symposium (USENIX Security). 659--674 . Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, Heqing Huang, Wei Zou, and Peng Liu. 2015. Finding Unknown Malice in 10 seconds: Mass Vetting for New Threats at the Google-play Scale. In Proceedings of 24th USENIX Security Symposium (USENIX Security). 659--674."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2018.8508284"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897860"},{"key":"e_1_3_2_2_13_1","unstructured":"Universit d du Luxembourg. 2016. AndroZoo . https:\/\/androzoo.uni.lu\/.  Universit d du Luxembourg. 2016. AndroZoo . https:\/\/androzoo.uni.lu\/."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23296"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818042"},{"key":"e_1_3_2_2_17_1","unstructured":"Google. 2020. Google - Introducing the Knowledge Graph: Things Not Strings . https:\/\/googleblog.blogspot.com\/2012\/05\/introducing-knowledge-graph-things-not.html .  Google. 2020. Google - Introducing the Knowledge Graph: Things Not Strings . https:\/\/googleblog.blogspot.com\/2012\/05\/introducing-knowledge-graph-things-not.html ."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_4"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIW.2016.040"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.57"},{"key":"e_1_3_2_2_21_1","volume-title":"Proceedings of 26th USENIX Security Symposium (USENIX Security). 625--642","author":"Jordaney Roberto","year":"2017","unstructured":"Roberto Jordaney , Kumar Sharad , Santanu K Dash , Zhi Wang , Davide Papini , Ilia Nouretdinov , and Lorenzo Cavallaro . 2017 . Transcend: Detecting Concept Drift in Malware Classification Models . In Proceedings of 26th USENIX Security Symposium (USENIX Security). 625--642 . Roberto Jordaney, Kumar Sharad, Santanu K Dash, Zhi Wang, Davide Papini, Ilia Nouretdinov, and Lorenzo Cavallaro. 2017. Transcend: Detecting Concept Drift in Malware Classification Models. In Proceedings of 26th USENIX Security Symposium (USENIX Security). 625--642."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.007"},{"key":"e_1_3_2_2_23_1","unstructured":"Kaspersky. 2019. Machine Learning Methods for Malware Detection . https:\/\/media.kaspersky.com\/en\/enterprise-security\/Kaspersky-Lab-Whitepaper-Machine-Learning.pdf .  Kaspersky. 2019. Machine Learning Methods for Malware Detection . https:\/\/media.kaspersky.com\/en\/enterprise-security\/Kaspersky-Lab-Whitepaper-Machine-Learning.pdf ."},{"key":"e_1_3_2_2_24_1","volume-title":"EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices","author":"Lei Tao","year":"2019","unstructured":"Tao Lei , Zhan Qin , Zhibo Wang , Qi Li , and Dengpan Ye. 2019. EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices . IEEE Internet of Things Journal (IOTJ) ( 2019 ). Tao Lei, Zhan Qin, Zhibo Wang, Qi Li, and Dengpan Ye. 2019. EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices. IEEE Internet of Things Journal (IOTJ) (2019)."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00028"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931044"},{"key":"e_1_3_2_2_27_1","unstructured":"Hu X Li Y Jang J. 2019. AMD Dataset . http:\/\/amd.arguslab.org\/sharing .  Hu X Li Y Jang J. 2019. AMD Dataset . http:\/\/amd.arguslab.org\/sharing ."},{"key":"e_1_3_2_2_28_1","volume-title":"Proceedings of the 29th AAAI Conference on Artificial Intelligence (AAAI) .","author":"Lin Yankai","year":"2015","unstructured":"Yankai Lin , Zhiyuan Liu , Maosong Sun , Yang Liu , and Xuan Zhu . 2015 . Learning Entity and Relation Embeddings for Knowledge Graph Completion . In Proceedings of the 29th AAAI Conference on Artificial Intelligence (AAAI) . Yankai Lin, Zhiyuan Liu, Maosong Sun, Yang Liu, and Xuan Zhu. 2015. Learning Entity and Relation Embeddings for Knowledge Graph Completion. In Proceedings of the 29th AAAI Conference on Artificial Intelligence (AAAI) ."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.103"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.12"},{"key":"e_1_3_2_2_31_1","first-page":"2579","article-title":"Visualizing Data Using t-SNE","volume":"9","author":"van der Maaten Laurens","year":"2008","unstructured":"Laurens van der Maaten and Geoffrey Hinton . 2008 . Visualizing Data Using t-SNE . Journal of machine Learning Research , Vol. 9 , Nov (2008), 2579 -- 2605 . Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing Data Using t-SNE. Journal of machine Learning Research , Vol. 9, Nov (2008), 2579--2605.","journal-title":"Journal of machine Learning Research"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23353"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029823"},{"key":"e_1_3_2_2_34_1","unstructured":"Trend Micro. 2018a. The Evolution of XLoader and FakeSpy: Two Interconnected Android Malware Families . https:\/\/documents.trendmicro.com\/assets\/pdf\/wp-evolution-of-xloader-and-fakespy-two-interconnected-android-malware-families.pdf .  Trend Micro. 2018a. The Evolution of XLoader and FakeSpy: Two Interconnected Android Malware Families . https:\/\/documents.trendmicro.com\/assets\/pdf\/wp-evolution-of-xloader-and-fakespy-two-interconnected-android-malware-families.pdf ."},{"key":"e_1_3_2_2_35_1","unstructured":"Trend Micro. 2018b. XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing . https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/xloader-android-spyware-and-banking-trojan-distributed-via-dns-spoofing\/.  Trend Micro. 2018b. XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing . https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/xloader-android-spyware-and-banking-trojan-distributed-via-dns-spoofing\/."},{"key":"e_1_3_2_2_36_1","volume-title":"Proceedings of the Advances in Neural Information Processing Systems (NIPS) . 3111--3119","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Ilya Sutskever , Kai Chen , Greg S Corrado , and Jeff Dean . 2013 . Distributed Representations of Words and Phrases and Their Compositionality . In Proceedings of the Advances in Neural Information Processing Systems (NIPS) . 3111--3119 . Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. 2013. Distributed Representations of Words and Phrases and Their Compositionality. In Proceedings of the Advances in Neural Information Processing Systems (NIPS) . 3111--3119."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727508"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.47"},{"key":"e_1_3_2_2_39_1","volume-title":"Proceedings of the 28th USENIX Security Symposium (USENIX Security). USENIX Association","author":"Pendlebury Feargus","year":"2019","unstructured":"Feargus Pendlebury , Fabio Pierazzi , Roberto Jordaney , Johannes Kinder , and Lorenzo Cavallaro . 2019 . TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time . In Proceedings of the 28th USENIX Security Symposium (USENIX Security). USENIX Association , Santa Clara, CA, 729--746. Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, and Lorenzo Cavallaro. 2019. TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time. In Proceedings of the 28th USENIX Security Symposium (USENIX Security). USENIX Association, Santa Clara, CA, 729--746."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23328"},{"key":"e_1_3_2_2_41_1","unstructured":"scikit-learn. 2020. scikit-learn Machine Learning in Python . https:\/\/scikit-learn.org .  scikit-learn. 2020. scikit-learn Machine Learning in Python . https:\/\/scikit-learn.org ."},{"key":"e_1_3_2_2_42_1","unstructured":"spaCy. 2020. spaCy - Industrial-Strength Natural Language Processing . https:\/\/spacy.io\/.  spaCy. 2020. spaCy - Industrial-Strength Natural Language Processing . https:\/\/spacy.io\/."},{"key":"e_1_3_2_2_43_1","volume-title":"Integration K-means Clustering Method and Elbow Method for Identification of the Best Customer Profile Cluster. In IOP Conference Series: Materials Science and Engineering","volume":"336","author":"Syakur MA","year":"2018","unstructured":"MA Syakur , BK Khotimah , EMS Rochman , and BD Satoto . 2018 . Integration K-means Clustering Method and Elbow Method for Identification of the Best Customer Profile Cluster. In IOP Conference Series: Materials Science and Engineering , Vol. 336 . IOP Publishing, 01 2017. MA Syakur, BK Khotimah, EMS Rochman, and BD Satoto. 2018. Integration K-means Clustering Method and Elbow Method for Identification of the Best Customer Profile Cluster. In IOP Conference Series: Materials Science and Engineering, Vol. 336. IOP Publishing, 012017."},{"key":"e_1_3_2_2_44_1","unstructured":"TensorFlow. 2020. TensorFlow - An End-to-end Open Source Machine Learning Platform . https:\/\/www.tensorflow.org\/.  TensorFlow. 2020. TensorFlow - An End-to-end Open Source Machine Learning Platform . https:\/\/www.tensorflow.org\/."},{"key":"e_1_3_2_2_45_1","unstructured":"VirusShare. 2020. VirusShare . https:\/\/virusshare.com .  VirusShare. 2020. VirusShare . https:\/\/virusshare.com ."},{"key":"e_1_3_2_2_46_1","unstructured":"VirusTotal. 2020. VirusTotal . https:\/\/virustotal.com .  VirusTotal. 2020. VirusTotal . https:\/\/virustotal.com ."},{"key":"e_1_3_2_2_47_1","volume-title":"Proceedings of the 28th AAAI Conference on Artificial Intelligence (AAAI) .","author":"Wang Zhen","year":"2014","unstructured":"Zhen Wang , Jianwen Zhang , Jianlin Feng , and Zheng Chen . 2014 . Knowledge Graph Embedding by Translating on Hyperplanes . In Proceedings of the 28th AAAI Conference on Artificial Intelligence (AAAI) . Zhen Wang, Jianwen Zhang, Jianlin Feng, and Zheng Chen. 2014. Knowledge Graph Embedding by Translating on Hyperplanes. In Proceedings of the 28th AAAI Conference on Artificial Intelligence (AAAI) ."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_12"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00014"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11203-9_10"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.50"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_15"},{"key":"e_1_3_2_2_54_1","volume-title":"Proceedings of the29th USENIX Security Symposium (USENIX Security) .","author":"Zhu Shuofei","year":"2020","unstructured":"Shuofei Zhu , Jianjun Shi , Limin Yang , Boqin Qin , Ziyi Zhang , Linhai Song , and Gang Wang . 2020 . Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines . In Proceedings of the29th USENIX Security Symposium (USENIX Security) . Shuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, and Gang Wang. 2020. Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines. In Proceedings of the29th USENIX Security Symposium (USENIX Security) ."}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event USA","acronym":"CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417291","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3417291","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3417291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:31Z","timestamp":1750197691000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417291"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":54,"alternative-id":["10.1145\/3372297.3417291","10.1145\/3372297"],"URL":"https:\/\/doi.org\/10.1145\/3372297.3417291","relation":{},"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"2020-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}